Solving Fuzzy PERT Using Gradual Real Numbers

Size: px
Start display at page:

Download "Solving Fuzzy PERT Using Gradual Real Numbers"

Transcription

1 Solving Fuzzy PERT Using Gradual Real Numbers Jérôme FORTIN a, Didier DUBOIS a, a IRIT/UPS 8 route de Narbonne, 3062, Toulouse, cedex 4, France, {fortin, dubois}@irit.fr Abstract. From a set of a partially ordered tasks, one goal of the project scheduling problem is to compute earliest starting dates, latest starting dates and floats of the different tasks, and to identify critical tasks. When durations of tasks are not precisely known, the problem is much trickier. Recently we provided polynomial algorithms to compute upper bound of activity floats in the interval-valued model. The aim of this paper is to extend those new algorithms to the fuzzy-valued problem. To this end, we use the new notion of gradual numbers [7], that represents soft boundaries of a fuzzy interval. We show that algorithms in the interval valued case can be adapted to fuzzy intervals considering them as crisp intervals of gradual numbers. Keywords. Fuzzy PERT, Gradual Numbers, Floats. Introduction Temporal Constraint Networks (TCN) represent relations between dates of events and also allow to express constraints on the possible durations of activities from intervals of values. TCN have been extended to take into account uncertainty of durations of some tasks in realistic applications by making a distinction between so-called contingent constraints and controllable ones []. The resulting network becomes a decision-making problem under uncertainty. This paper reconsiders the most basic scheduling problem, that of minimizing the makespan of a partially ordered set of activities, in the context of incomplete knowledge. When the durations of tasks of a project scheduling problem are ill-known and modeled by intervals, the problem can be viewed as a special kind of TCN where all tasks are modeled by contingent constraints, and controllable constraints only describe precedence between tasks. Of course, the resulting network is always controllable if the graph of precedence constraints is acyclic. This paper answers the question of optimizing the total duration of such a network when constraints are set by fuzzy intervals. One goal of project scheduling problem is to compute earliest starting dates, latest starting dates and floats of the different tasks, and to identify critical tasks. When tasks durations are precisely known, this problem is solved by the PERT/CPM Algorithm (Critical Path Method). When task durations are ill known and lie in an interval, this problem is much more difficult. In recent paper [8], we give polynomial algorithms to

2 compute upper bound of floats in the interval-valued model. Here we prove that those algorithms can be adapted the fuzzy-valued problem. For this purpose, we will recall and use a recent notion introduced in fuzzy set theory, called gradual numbers [7]. This notion makes it possible to define and use gradual bounds of fuzzy intervals and then apply already known interval analysis ideas to the fuzzy counterpart of interval problems. The paper is organized as follows; Section 2 gives the background needed to construct our new algorithms: Subsection 2. recalls the basic PERT/CPM problem of project scheduling. Subsection 2.2 re states the recent results of [8] to solve the PERT/CPM problem when tasks are modeled by intervals. Then Subsection 2.3 gives general definition and intuitions of so called gradual numbers. A subproblem is addressed in Section 3, that is the computation of earliest starting dates, latest starting dates and floats when durations of tasks are modeled by gradual numbers. And finally Section 4 gives algorithms to compute degrees of necessary criticality in polynomial time, and the least upper bound (LUB) of floats for each possibility degree λ Preliminaries 2.. Classical PERT Model An activity network is classically defined as a set of activities (or tasks) with given duration times, related to each other by means of precedence constraints. When there are no resource constraints, it can be represented by a directed, connected and acyclic graph. Of major concern, is to minimize the ending time of the last task, also called the makespan of the network. For each task, three quantities have practical importance for the management of the activity network: The earliest starting time est i j of an activity i j is the date before which the activity cannot be started without violation of a precedence constraint. The latest starting time lst i j of an activity i j is the date after which the activity cannot be started without delaying the end of the project. The float f i j of an activity i j is the difference between the latest starting time lst i j and the earliest starting time est i j. An activity is critical if and only if its float is equal to zero. Under the assumption of minimal makespan, critical tasks must be started and completed at prescribed time-points. A directed, connected and acyclic graph G V A, represents an activity network. We use the activity-on-arc convention. V is the set of nodes (events), V n, and A is the set of arcs (activities), A m. The set V 2 n is labeled in such a way that i j for each activity i j A. Activity durations d i j (weights of the arcs) i j A are well known. See Figure for a simple example of project scheduling problem. Task durations are the values given on the arc of the graph. Two nodes and n are distin Figure. Simple project scheduling problem guished as the initial and final node, respectively. We also need some additional notations to speak about predecessor or successor of a task or a node, and subgraphs of G:

3 Succ i (resp. Pred i ) refers to the set of nodes that immediately follow (resp. precede) node i V. SUCC i j (resp. PRED i j ) denotes the set of all arcs that come after (resp. before) i j A, and SUCC j (resp. PRED j ) stands for the set of all nodes that come after (resp. before) j V. G i j is the subgraph of G composed of nodes succeeding i and preceding j. G d i j d is the graph where duration of task i j is replaced by d. With these notations, we can give precise formulas defining earliest starting dates, latest starting dates and floats of tasks and events: The earliest starting date of an event k is the longest path from the beginning of the project, represented by node, and node k. We arbitrary fix the starting time of project to est 0. Of course the earliest starting date of a task k l is equal to the earliest starting date of event k. The following recursive formula give the key to compute earliest starting dates of events and tasks. 0 if k est k max j Pred k est j d jk otherwise est est k The earliest ending time for the project is the earliest starting time of the last event n. In order to ensure a minimal duration of the project, the latest starting date of event n is equal to its earliest starting date (lst n est n ). The latest starting date of a task k l is the time after which we can not start its execution without delaying the end of the project, so it is in fact the difference between the earliest ending date of the project and the longest path from node n and node l minus the duration of the task k l. We can now define the latest starting date of events and tasks by the following formulas: est lst k n if k n min l Succk lst l d otherwise lst lst l d The float of a task k l which represents the length of the time window for the beginning of the execution of the task is the difference between the latest starting date and the earliest starting date: f lst est The well known PERT/CPM algorithm computes the earliest starting dates, latest starting dates and float in linear time complexity (O m n ). It executes a forward recursion from node to node n to give the longest path from node to each node of the graph. Then it runs a backward recursion to compute latest starting dates and so the floats. The PERT algorithm give the following earliest starting dates, latest starting dates and floats of project of Figure : est 2 0, est 23 2, est 3 0, lst 2 0, lst 23 2, lst 3, f 2 0, f 23 0, f Interval-Valued PERT Model In this section we recall recent results published in the CP2005 conference proceedings [8]. Suppose the durations d i j of tasks i j of the precedent model are not precisely known, but are known to lie in an interval range D i j d i j d i j. It means that the real exact duration of the task will be in D i j, but it can neither be known nor chosen in this interval. This problem was first formulated by Bucey [], and was completely solved very recently in [8].

4 An instantiation of all task durations of the network is called a configuration, and a instantiation of all task durations for which task duration is set to the minimal value d i j or maximal value di j is called a extreme configuration. We note the set of possible configurations: i j AD i j. In this formulation, a task i j can be possibly critical, if there exists a configuration for which i j is critical in the usual sense. A task is not possibly critical if there exists no configuration for which i j is critical in the usual sense. A task is necessarily critical if it is critical for each configuration. And a task is not necessarily critical is there exists at least one configuration for which the task is not critical in the usual sense. Finding possible and necessarily critical tasks is very important for a project manager. Other useful pieces of information are the possible earliest starting dates, possible latest starting date and possible floats, which become intervals: EST est est est Ω Ω LST lst lst lst Ω Ω F f f f Ω Ω where est Ω (resp. lst Ω and f Ω ) represents the earliest starting date of k l (resp. latest starting date and float) in configuration Ω Asserting Necessarily Criticality Asserting if a task is possibly critical is an NP-Hard problem [2], while asserting is a task is necessarily critical is polynomially solvable [8]. As in the classical problem, criticality and floats are obviously connected: Proposition An activity k l only if f 0 (resp. f 0). A is possibly (resp. necessarily) critical in G if and In this paper we focus on asserting the necessarily criticality of a task, and on computing the upper bound of the float, when durations are modeled by fuzzy interval. The same approach can be applied for computing latest starting dates in polynomial time, or for asserting the possible criticality of a task and computing the lower bound of the float, but it can only be done with exponential time complexity. Because of the lack of space in conference proceedings, we choose to deal with necessarily criticality and upper bound of the float. A first algorithm that asserts the necessarily criticality of a task k l in the interval case when predecessors of k l are precisely known is based on the following propositions [8]: Proposition 2 An activity k l A is necessarily critical in G if and only if k l is critical in an extreme configuration in which the duration of k l is at its lower bound and all activities from set A SUCC k l PRED k l k l have durations at their upper bounds. Proposition 3 Let k l A be a distinguished activity, and i j be an activity such that i j SUCC k l. Assume that every activity u v PRED i j has precise duration. If k l is critical in G i, then: k l is necessarily critical in G If k l is not critical in G i, then: k l is necessarily critical in G k l is necessarily critical in G d i j d i j. k l is necessarily critical in G d i j di j.

5 Proposition 2 and 3 lead to an algorithm for asserting the necessary criticality of a given activity k l in a network in which all activities that precede k l have precise durations. The algorithm recursively assigns an exact duration to tasks succeeding k l without changing the necessarily criticality of k l. The algorithm works as follows: At the initialization, we set all durations of tasks not succeeding k l to their upper bound, and duration of k l to its lower bound (according to Proposition 2). Then at the first iteration of the algorithm, we only consider the sub network G l. In this network, all tasks durations are precisely fixed, so a classical PERT/CPM run decides the necessary criticality of k l in G l. Now, according to Proposition 2 we can set to a precise duration tasks immediately succeeding node l: if k l is necessary critical in G l, duration of tasks l m (m Succ l ) are set to their minimal duration, otherwise, they are set to their maximal duration. Then the second iteration considers the sub network G l. At this step all tasks durations are precisely set in this sub network, we can check the criticality of k l with the standard PERT/CPM algorithm, and so on. After the last iteration, all tasks durations are precisely instantiated and k l is critical in this instantiation, if and only if task k l is necessary critical in the original network G n (where duration of tasks not preceding k l are intervals). The next proposition will lead to a polynomial algorithm which asserts the necessary criticality of a task k l in the general case: Proposition 4 Let k l A be a distinguished activity, and i j be an activity such that i j PRED k l. If k l is necessarily critical in G j n, then: k l is necessarily critical in G k l is necessarily critical in G d i j d i j If k l is not necessarily critical in G j n, then: k l is necessarily critical in G k l is necessarily critical in G d i j di j With the help of the previous algorithm, Proposition 4 leads to an algorithm which recursively assigns an exact duration to tasks preceding k l without changing the necessarily criticality of k l. At the first iteration, we consider the sub network G k n. In this network all tasks preceding k l have precise durations (because there is no task preceding k l ). So we can invoke the previous algorithm to know if k l is necessary critical in G k n. Now, with the help of Proposition 4, we can precisely set the duration of tasks just preceding node k. At the second iteration, we consider the sub network G k n, where all tasks preceding k l are now precisely fixed, so we can call the previous algorithm (with original interval durations for tasks succeeding k l ), and so on. At the end of this Algorithm, all durations of tasks preceding k l are precisely set, and k l is necessary critical in the original network if and only if it is necessary critical in the instantiated network. So finally, putting together Proposition 3 and 4 we can assert if a task k l is necessarily critical in O mn time complexity. The two previous algorithms used conjointly instantiate all task duration in a network without changing the necessary criticality of a given task k l. That means that k l is necessarily critical if and only if its float is null in the so built configuration. If k l is necessary critical the LUB of the float have been computed and is f 0. But, if this float is not null in the constructed configuration, then the computed value of the float is not the correct LUB of float of k l. We call this computed value the potential float of k l.

6 Computing Least Upper Bound of Floats The key idea to compute the least upper bound (LUB) on float f of activity k l in G, is to increase the minimal duration d until k l becomes necessarily critical. Then it is proved that the LUB of float is equal to the overall increment of d [8]: Proposition 5 Let f be the minimal nonnegative real number such that k l is necessarily critical in G d d f. Then f f. Let us explain how to find this increment. One can note that if a task k l is necessarily critical in G, then there exists a path p from node to node k such that for every node j p, k l is necessarily critical in G j n [8]. So the minimal increment that can make k l necessarily critical is given by next lemma: Lemma Let min j f j n f j n 0 where f j n is the potential float of task k l in G j n, j PRED k (i.e. f j n is the float in the configuration induced by the algorithm which asserts if k l is necessary critical). Then for all ε, activity k l is not necessarily critical in G j n, j PRED k, with duration d d ε (the configuration constructed for asserting the necessary criticality is the same). Moreover there exists j PRED k such that k l becomes necessarily critical in G j n with duration d d (the configuration constructed for asserting the necessary criticality is not the same). The algorithm which computes the LUB of floats works as follow: For each node i preceding k l it computes the potential float of k l in G i n with the algorithm which assert the necessary criticality of k l. If the potential float of k l in G n is not 0, then the minimal potential float computed is added to the minimal duration d of k l, and the algorithm is run again from the beginning until k l becomes necessary critical in G. The total added value to the minimal duration d so far is then the LUB of the floats of k l. We are going to see that those algorithms can be easily adapted to the fuzzy-valued version of this problem, using the new notion of gradual numbers, thus providing in polynomial time the degree of necessarily criticality of a task Gradual Numbers To solve the fuzzy interval valued model PERT, we will use in this paper the recent notion of gradual numbers [7]. What is often called a fuzzy number [2,5] is the extension of an interval, not a real number. Hence, fuzzy interval is a better name for a fuzzy set of reals whose cuts are intervals. In a fuzzy interval, it is the interval that models incomplete knowledge (we know that some parameter lies between two bounds), not the fuzziness per se. Intervals model uncertainty in a Boolean way: a value in the interval is possible; a value outside is impossible. What fuzziness brings is to make the boundaries of the interval softer, thus making uncertainty gradual. In order to model the essence of graduality without uncertainty, gradual numbers are defined as follow:

7 Definition (Gradual real number [7]) A gradual real number (or gradual number for short) r is defined by an assignment function A r from 0 (the unit interval minus 0) to the reals. We note the set of all gradual real numbers. A gradual number is a number parametrized by a value α which range in 0. Intuitively, an element α 0 is the degree of plausibility of a scenario, and A r α is the value of some parameter in this scenario. Using the notion of gradual number, we can describe a fuzzy interval M by an ordered pair of specific gradual numbers m m. m is called the gradual lower bound of M and m the gradual upper bound. To ensure the well known shape of a fuzzy interval, several properties of m and m must hold: the domains of A m and A m must be 0 A m need to be increasing A m need to be decreasing m and m must be well ordered (A m A m ). Such a pair of gradual numbers intuitively describe a fuzzy interval with membership function: sup λ A m λ x if x A m 0 if A µ M x m x A m sup λ A m λ x if x A m 0 0 otherwise An upper semi continuous membership function µ M, can be described by the pair of gradual reals m m defined by A m : 0 λ A m : 0 λ A m λ in f x µ M x λ A m λ sup x µ M x λ To know more about general framework of gradual numbers, reader should refer to the following papers: [7,3,6]. The sum of gradual numbers r and s is simply defined by summing their assignment functions. It is r s such that α 0, A r s α A r α A s α. Most algebraic properties of real numbers are preserved for gradual real numbers, contrary to the case of fuzzy intervals. For example, the set of the gradual real numbers with the addition operation forms a commutative group with identity 0 (A 0 λ 0 λ 0 ). Indeed the gradual real number r has an inverse r under the addition: A r α A r α, and r r 0. Classical arithmetic operations are defined intuitively: If r and s are two gradual numbers, addition: A r s α A r α A s α. subtraction: A r s α A r α A s α. multiplication: A r s α A r α A s α. A r division: A α α r s A s α, if λ 0, A s α 0. maximum: max A r A s α max A r α A s α. minimum: min A r A s α min A r α A s α. Note that contrary to real numbers, the maximum operation on gradual numbers is not selective: max A r A s A r or A s. There are sub ranges of 0 where max A r A s A r and it is A s in the complementary range. If A r and A s are linear, these ranges are of the form 0 θ and θ for a threshold θ.

8 λ PSfrag replacements 0.5 d 2 λ 0.5 d 23 λ 0.5 d 3 x x x Figure 2. Gradual duration of tasks of the project of Figure 3. The Gradual-Valued Project Scheduling Problem As in the previous section, an activity network is represented by a directed, connected and acyclic graph G V A. But now, activity durations d i j ( i j A) are defined by gradual numbers. It means that all durations depend on a parameter to be chosen (for instance indexing scenarios). This problem formulation is given to validate the PERT algorithm with gradual numbers which is used in next sections. However we can see this problem as an optimization problem on a family of scenarios: for a given λ, d i j λ is a precise duration, and so configuration (set of the durations) at degree λ is a particular scenario. This parametric approach can model dependencies between tasks durations, but only with one degree of freedom. Figure 2 provides gradual durations of tasks of the project of Figure. d 3 λ 2 λ means that the duration of task 3 is 2 in each considered scenario. We can note on this example that the duration of tasks 2 and 2 3 are correlated, and the more time the task 2 will require, the faster the task 2 3 will be executed. Computing earliest starting date, latest starting date and float of this problem is very simple: we just need to run the standard PERT Algorithm, where,, max and min are the four operations on gradual numbers seen in the previous section. This is due to the fact that all algebraic properties needed to apply the PERT Algorithm are preserved by the gradual numbers, for example the fact that max is an idempotent semi-ring, validates the forward recursion of the PERT Algorithm. The backward recursion is possible since the addition operation as an inverse ( is a commutative group), so contrary to the interval valued problem, we do not run the risk of counting any uncertainty twice. For more detail, the reader should refer to [7,9]. Algorithm works as follow: Line is the initialization to 0 of all the earliest starting dates of events (nodes of the graph). Part from line 2 to line 5 is the standard forward recursion which computes earliest starting dates. Line 6 is initialization of the latest starting dates. Lines 7 to is the standard backward recursion which computes latest starting dates and float. The main difference between this algorithm and the usual PERT/CPM algorithm is in the form of the results, because max and min are not selective, a characteristic of a task may not correspond to a single configuration. For instance, a task may be critical for some values of λ 0 and not critical for other values. We present on Figure 3 the results of the computation of the earliest starting date, latest starting date and float of task 2 3. It means that for all scenario generated with λ 3, the task 2 3 is critical, but it is not for λ 3. In practice, we must store this information describing a more complex situation than in the deterministic case.

9 Algorithm : GradualPERT Input: A network G V A, activity duration is known as gradual numbers. Output: Gradual earliest starting date est i j, gradual latest starting date lst i j and gradual float f i j of each task i j of the network. foreach i n do est i 0; 2 for i l to n do 3 foreach j Succ i do 4 est i j est i ; 5 est j max est j est i d i j ; 6 foreach i n do lst i est n ; 7 for j n downto 2 do 8 foreach i Pred j do 9 lst i j lst j d i j ; 0 f i j lst i j est i j ; lst i min lst i lst j d i j ; PSfrag replacements λ 0.5 est 23 λ 0.5 λ lst f 23 x x x Figure 3. Gradual earliest starting date, latest starting date and float 4. Fuzzy Interval Valued PERT In this section, we suppose that durations of tasks of the project are given by fuzzy intervals. A simple model of a fuzzy task duration for a regular PERT user can be a triangular fuzzy interval whose core is the most plausible duration and whose support is the interval of all possible durations. We show that we can assert the necessarily criticality degree of a task in polynomial time complexity. Then we will give an algorithm to obtain the gradual upper bound of the float of a given task. 4.. Asserting Necessarily Criticality We have seen in Section 2.2 that we can precisely set the duration of all tasks of the network without changing the criticality of a given task k l when task duration are modeled by crisp intervals. To assert the degree of necessary criticality of a task k l in the fuzzy case, we can use the same type of algorithm, using gradual numbers instead of real numbers. But from Proposition 3 (resp. 4), to fix the precise gradual duration of a task i j, we have to test if the task k l is critical in the subnetwork G j n (resp. G j ). We have seen in the previous section that on a gradual PERT, tasks can be critical for some possibility degree and not critical for others (see example on Figure 3).

10 This means that the gradual duration assigned to task i j may involve both upper and lower gradual bounds of the duration D i j d i j d i j. Algorithm 2: Input: A network G, activity k l, fuzzy interval durations D uv d uv duv, u v A and for every task in PRED k l the duration d is precisely given (but gradual). Output: f the potential maximal float of task k l : f λ 0 for all possibility degree for which the task is necessarily critical, f λ 0 for all possibility degree for which the task is not necessarily critical, but in this case f λ is not the exact float of k l. foreach u v SUCC k l do d uv duv; 2 d d ; 3 for i l to n such that i SUCC l l do 4 f Algorithm with G i ; 5 foreach λ 0 such that f λ 0 do 6 foreach j Succ i do d i j λ d i j λ ; 7 foreach λ 0 such that f λ 0 do 8 foreach j Succ i do d i j λ di j λ ; 9 return f ; Line of Algorithm 2 initializes gradual durations of all tasks of the network not succeeding k l to their maximal gradual bounds, according to Proposition 2. Lines 3 8 assign gradual values for the tasks succeeding k l, depending on the criticality of k l, with respect to Proposition 4. The creation of the gradual duration d i j (Lines 5 and 8) may seem complex, but is very simple to implement in practice, for example, when durations are given by piecewise linear fuzzy intervals [0]. Then gradual bounds of those interval can be simply modeled by the lists of their kinks. All computed gradual durations are also piecewise linear, since operations,, max and min preserve the piecewise linearity. In this context, finding all λ 0 such that f λ 0 remains to find the pairs of adjacent kinks whose abscissa is 0. Note that the result f of Algorithm 2 is not the correct maximal gradual float f of k l : it is correct only if f λ 0. So this Algorithm is useful to know the Necessary degree criticality of a task when its predecessors are precisely (but gradually) fixed, and will be invoked in the next algorithm. Algorithm 3 computes the necessary criticality degree of a given task k l when all task durations are fuzzy interval valued. It recursively assigns precise (but gradual) durations to tasks preceding node k, due to to Proposition 4. The result is a gradual potential maximal float f of task k l, which means that k l is necessarily critical at degree at least λ if and only if f λ 0. But if f λ 0, then f λ is not the correct maximal float of k l at possibility degree λ. Computing the exact maximal float λ at possibility degree λ is the subject of the next paragraph. f

11 Algorithm 3: Input: A network G, activity k l, fuzzy interval durations D uv u v A. d uv duv, Output: f the potential maximal float of task k l : f λ 0 for all possibility degree for which the task is necessarily critical, f λ 0 for all possibility degree for which the task is not necessarily critical, but in this case f λ is not the exact float of k l. for j k downto 2 such that i PRED k k do 2 f Algorithm 2 with G j n ; 3 foreach λ 0 such that f λ 0 do 4 foreach i Pred j do d i j λ d i j λ ; 5 foreach λ 0 such that f λ 0 do 6 foreach i Pred j do d i j λ di j λ ; 7 return f ; Algorithm 4: Input: A network G, activity k l, fuzzy interval durations D uv, u v A. Output: The gradual least upper bound f of floats of k l. foreach i Pred k do i n f with Algorithm 3 in network G i n ; 2 f 3 f 0; d d ; 4 while f n 0 do 5 foreach λ 0; do 6 λ min f j n λ j PRED k f j n λ 7 d d ; 8 foreach i Pred k do 9 f i n f with Algorithm 3 in network G i n ; 0 return f 4.2. Computing Gradual Least Upper Bound of Floats 0 ; We can now compute the gradual upper bound of the floats of a task k l. The idea is to make k l necessarily critical for all λ by adding a gradual duration to d. This is done by Algorithm 4. The first step of the algorithm computes f i n, the potential float of k l in the network G i n (lines and 2). In practice, only one iteration of Algorithm 3 is needed to obtain f i n for all i Pred k. The second step of the algorithm constructs a gradual duration to add to d in order to make k l necessarily critical in at least one more sub network G i n, for all possibility degree (lines 5 and 6). In practice, constructing is easy, we just need to restrict all the f i n on a domain for which f i n λ 0 and f n λ 0, and take their minimum, as defined in Section 2.3. Algorithm 4 repeats this step until k l becomes necessarily critical in G n for all possibility degree. The total gradual increase of d is then the gradual float

12 f of k l. By definition of the gradual numbers, the obtained f is such that f λ is the exact LUB of floats of task k l at possibility degree λ, and the degree of criticality is inf λ f λ 0. Remark: In the interval valued problem, asserting possible criticality and computing lower bound of floats are NP Hard problems [8]. However efficient algorithms exist and can be adapted to the fuzzy interval case with the help of gradual numbers. One of these algorithms consists in running a PERT/CPM on configurations where all task durations are set to their lower bounds but on a path from node to node n [4]. The lower bound of the float of a task is then the minimal computed float over the configurations issued from all possible paths. This method is directly applicable to the fuzzy valued problem, using gradual bounds of fuzzy intervals, instead of usual interval end points. 5. Conclusion In this paper, we generalize some recent results of [8] for project scheduling problems under uncertainty, when task durations are modeled by fuzzy intervals. We give algorithms that assert the degree of necessarily criticality of a given task in polynomial time. And we construct an algorithm to compute the least upper bound of floats in polynomial time for each possibility degree λ 0. Those algorithms are based on the very recent notion of gradual number, which provides a new way of looking at fuzzy intervals as classical intervals of gradual numbers. Thus allowing to apply interval analysis methods to fuzzy intervals directly. References [] J.J. Bucey. Fuzzy PERT. In Applications of fuzzy set methodologies in industrial engineering, pages Elsevier, 989. [2] S. Chanas and P. Zielinski. On the hardness of evaluating criticality of activities in planar network with duration intervals. Operation Research Letters, 3:53 59, [3] D. Dubois, H. Fargier, and J. Fortin. A generalized vertex method for computing with fuzzy intervals. In Procedings of the IEEE International Conference on Fuzzy Systems (Budapest, Hungary), pages , [4] D. Dubois, H. Fargier, and J. Fortin. Computational methods for determining the latest starting times and floats of tasks in interval-valued activity networks. Journal of Intelligent Manufacturing, 6(4-5):407 42, [5] D. Dubois, E. Kerre, R. Mesiar, and H. Prade. Fuzzy interval analysis. In Fundamentals of Fuzzy Sets, pages Kluwer, [6] D. Dubois and H. Prade. Fuzzy elements in a fuzzy set. In Proc. 0th Inter. Fuzzy Systems Assoc. (IFSA) Congress, Beijing, pages 55 60, [7] J. Fortin, D. Dubois, and H. Fargier. Gradual numbers and their application to fuzzy interval analysis. submitted to IEEE Transactions on Fuzzy Systems, [8] J. Fortin, P. Zieliński, D. Dubois, and H. Fargier. Interval analysis in scheduling. In Proc. of the Int. Conf. on Principles and Practice of Constraint Programming (CP 2005) (Sitges), pages , [9] M. Gondran and M. Minoux. Graphs and Algorithms. John Wiley and sons, 995. [0] E.E. Kerre, H. Steyaert, F. Van Parys, and R. Baekeland. Implementation of piecewise linear fuzzy quantities. International Journal of Intelligent Systems, 0: , 995. [] Paul Morris, Nicola Muscettola, and Thierry Vidal. Dynamic control of plans with temporal uncertainty. In IJCAI, pages , 200. [2] L.A. Zadeh. Fuzzy sets. Journal of Information and Control, 8: , 965.

Criticality analysis of activity networks under interval uncertainty

Criticality analysis of activity networks under interval uncertainty J Sched (2010) 13: 609 627 DOI 10.1007/s10951-010-0163-3 Criticality analysis of activity networks under interval uncertainty Jérôme Fortin Paweł Zieliński Didier Dubois Hélène Fargier Published online:

More information

A Dynamic Programming algorithm for minimizing total cost of duplication in scheduling an outtree with communication delays and duplication

A Dynamic Programming algorithm for minimizing total cost of duplication in scheduling an outtree with communication delays and duplication A Dynamic Programming algorithm for minimizing total cost of duplication in scheduling an outtree with communication delays and duplication Claire Hanen Laboratory LIP6 4, place Jussieu F-75 252 Paris

More information

A Critical Path Problem Using Triangular Neutrosophic Number

A Critical Path Problem Using Triangular Neutrosophic Number A ritical Path Problem Using Triangular Neutrosophic Number Mai Mohamed 1 Department of Operations Research Faculty of omputers and Informatics Zagazig University, Sharqiyah, Egypt Yongquan Zhou 2 ollege

More information

A Critical Path Problem Using Triangular Neutrosophic Number

A Critical Path Problem Using Triangular Neutrosophic Number A Critical Path Problem Using Triangular Neutrosophic Number Excerpt from NEUTROSOPHIC OPERATIONAL RESEARCH, Volume I. Editors: Prof. Florentin Smarandache, Dr. Mohamed Abdel-Basset, Dr. Yongquan Zhou.

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Compenzational Vagueness

Compenzational Vagueness Compenzational Vagueness Milan Mareš Institute of information Theory and Automation Academy of Sciences of the Czech Republic P. O. Box 18, 182 08 Praha 8, Czech Republic mares@utia.cas.cz Abstract Some

More information

Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management

Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management Mai Mohamed 1* Department of Operations Research Faculty of Computers and Informatics Zagazig University Sharqiyah Egypt

More information

The Empirical Variance of a Set of Fuzzy Intervals

The Empirical Variance of a Set of Fuzzy Intervals The mpirical Variance of a Set of Fuzzy Intervals Didier Dubois IRIT / UPS 8, rte de narbonne F-3062 Toulouse, France -mail: dubois@irit.fr Hélène Fargier IRIT / UPS 8, rte de narbonne F-3062 Toulouse,

More information

As Soon As Probable. O. Maler, J.-F. Kempf, M. Bozga. March 15, VERIMAG Grenoble, France

As Soon As Probable. O. Maler, J.-F. Kempf, M. Bozga. March 15, VERIMAG Grenoble, France As Soon As Probable O. Maler, J.-F. Kempf, M. Bozga VERIMAG Grenoble, France March 15, 2013 O. Maler, J.-F. Kempf, M. Bozga (VERIMAG Grenoble, France) As Soon As Probable March 15, 2013 1 / 42 Executive

More information

Chi-square goodness-of-fit test for vague data

Chi-square goodness-of-fit test for vague data Chi-square goodness-of-fit test for vague data Przemys law Grzegorzewski Systems Research Institute Polish Academy of Sciences Newelska 6, 01-447 Warsaw, Poland and Faculty of Math. and Inform. Sci., Warsaw

More information

A scheme developed by Du Pont to figure out

A scheme developed by Du Pont to figure out CPM Project Management scheme. A scheme developed by Du Pont to figure out Length of a normal project schedule given task durations and their precedence in a network type layout (or Gantt chart) Two examples

More information

11/8/2018. Overview. PERT / CPM Part 2

11/8/2018. Overview. PERT / CPM Part 2 /8/08 PERT / CPM Part BSAD 0 Dave Novak Fall 08 Source: Anderson et al., 0 Quantitative Methods for Business th edition some slides are directly from J. Loucks 0 Cengage Learning Overview Last class introduce

More information

Extended Triangular Norms on Gaussian Fuzzy Sets

Extended Triangular Norms on Gaussian Fuzzy Sets EUSFLAT - LFA 005 Extended Triangular Norms on Gaussian Fuzzy Sets Janusz T Starczewski Department of Computer Engineering, Częstochowa University of Technology, Częstochowa, Poland Department of Artificial

More information

arxiv: v2 [cs.ds] 27 Nov 2014

arxiv: v2 [cs.ds] 27 Nov 2014 Single machine scheduling problems with uncertain parameters and the OWA criterion arxiv:1405.5371v2 [cs.ds] 27 Nov 2014 Adam Kasperski Institute of Industrial Engineering and Management, Wroc law University

More information

arxiv: v1 [cs.oh] 19 Oct 2012

arxiv: v1 [cs.oh] 19 Oct 2012 A Robust Lot Sizing Problem with Ill-known Demands arxiv:1210.5386v1 [cs.oh] 19 Oct 2012 Romain Guillaume, Université de Toulouse-IRIT, 5, Allées A. Machado, 31058 Toulouse Cedex 1, France, Romain.Guillaume@irit.fr

More information

Representing Independence Models with Elementary Triplets

Representing Independence Models with Elementary Triplets Representing Independence Models with Elementary Triplets Jose M. Peña ADIT, IDA, Linköping University, Sweden jose.m.pena@liu.se Abstract An elementary triplet in an independence model represents a conditional

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

A Critical Path Problem in Neutrosophic Environment

A Critical Path Problem in Neutrosophic Environment A Critical Path Problem in Neutrosophic Environment Excerpt from NEUTROSOPHIC OPERATIONAL RESEARCH, Volume I. Editors: Prof. Florentin Smarandache, Dr. Mohamed Abdel-Basset, Dr. Yongquan Zhou. Foreword

More information

On the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms

On the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms On the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms Anne Benoit, Fanny Dufossé and Yves Robert LIP, École Normale Supérieure de Lyon, France {Anne.Benoit Fanny.Dufosse

More information

Single machine scheduling with forbidden start times

Single machine scheduling with forbidden start times 4OR manuscript No. (will be inserted by the editor) Single machine scheduling with forbidden start times Jean-Charles Billaut 1 and Francis Sourd 2 1 Laboratoire d Informatique Université François-Rabelais

More information

Lecture 22: Counting

Lecture 22: Counting CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.

More information

PROGRAMMING CPM. Network Analysis. Goal:

PROGRAMMING CPM. Network Analysis. Goal: PROGRAMMING CPM 5/21/13 Network Analysis Goal: Calculate completion time Calculate start and finish date for each activity Identify critical activities Identify requirements and flows of resources (materials,

More information

Acyclic and Oriented Chromatic Numbers of Graphs

Acyclic and Oriented Chromatic Numbers of Graphs Acyclic and Oriented Chromatic Numbers of Graphs A. V. Kostochka Novosibirsk State University 630090, Novosibirsk, Russia X. Zhu Dept. of Applied Mathematics National Sun Yat-Sen University Kaohsiung,

More information

The computational complexity of dominance and consistency in CP-nets

The computational complexity of dominance and consistency in CP-nets The computational complexity of dominance and consistency in CP-nets Judy Goldsmith Dept. of Comp. Sci. University of Kentucky Lexington, KY 40506-0046, USA goldsmit@cs.uky.edu Abstract Jérôme Lang IRIT

More information

Crisp Profile Symmetric Decomposition of Fuzzy Numbers

Crisp Profile Symmetric Decomposition of Fuzzy Numbers Applied Mathematical Sciences, Vol. 10, 016, no. 8, 1373-1389 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ams.016.59598 Crisp Profile Symmetric Decomposition of Fuzzy Numbers Maria Letizia Guerra

More information

From Crisp to Fuzzy Constraint Networks

From Crisp to Fuzzy Constraint Networks From Crisp to Fuzzy Constraint Networks Massimiliano Giacomin Università di Brescia Dipartimento di Elettronica per l Automazione Via Branze 38, I-25123 Brescia, Italy giacomin@ing.unibs.it Abstract. Several

More information

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Pinar Heggernes Pim van t Hof Daniel Meister Yngve Villanger Abstract Given two graphs G and H as input, the Induced Subgraph

More information

Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic

Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic Salem Benferhat CRIL-CNRS, Université d Artois rue Jean Souvraz 62307 Lens Cedex France benferhat@criluniv-artoisfr

More information

Chapter 4: Computation tree logic

Chapter 4: Computation tree logic INFOF412 Formal verification of computer systems Chapter 4: Computation tree logic Mickael Randour Formal Methods and Verification group Computer Science Department, ULB March 2017 1 CTL: a specification

More information

Acyclic Digraphs arising from Complete Intersections

Acyclic Digraphs arising from Complete Intersections Acyclic Digraphs arising from Complete Intersections Walter D. Morris, Jr. George Mason University wmorris@gmu.edu July 8, 2016 Abstract We call a directed acyclic graph a CI-digraph if a certain affine

More information

Solution of Fuzzy Maximal Flow Network Problem Based on Generalized Trapezoidal Fuzzy Numbers with Rank and Mode

Solution of Fuzzy Maximal Flow Network Problem Based on Generalized Trapezoidal Fuzzy Numbers with Rank and Mode International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 7 (January 2014), PP. 40-49 Solution of Fuzzy Maximal Flow Network Problem

More information

Distributed Optimization. Song Chong EE, KAIST

Distributed Optimization. Song Chong EE, KAIST Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links

More information

Neutrosophic Sets, Project, Project Management, Gantt chart, CPM, PERT, Three-Time Estimate.

Neutrosophic Sets, Project, Project Management, Gantt chart, CPM, PERT, Three-Time Estimate. Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management Excerpt from NEUTROSOPHIC OPERATIONAL RESEARCH, Volume I. Editors: Prof. Florentin Smarandache, Dr. Mohamed Abdel-Basset,

More information

IBM Research Report. On the Linear Relaxation of the p-median Problem I: Oriented Graphs

IBM Research Report. On the Linear Relaxation of the p-median Problem I: Oriented Graphs RC4396 (W07-007) November, 007 Mathematics IBM Research Report On the Linear Relaxation of the p-median Problem I: Oriented Graphs Mourad Baïou CNRS LIMOS Complexe scientifique des Czeaux 6377 Aubiere

More information

An Evaluation of the Reliability of Complex Systems Using Shadowed Sets and Fuzzy Lifetime Data

An Evaluation of the Reliability of Complex Systems Using Shadowed Sets and Fuzzy Lifetime Data International Journal of Automation and Computing 2 (2006) 145-150 An Evaluation of the Reliability of Complex Systems Using Shadowed Sets and Fuzzy Lifetime Data Olgierd Hryniewicz Systems Research Institute

More information

On bilevel machine scheduling problems

On bilevel machine scheduling problems Noname manuscript No. (will be inserted by the editor) On bilevel machine scheduling problems Tamás Kis András Kovács Abstract Bilevel scheduling problems constitute a hardly studied area of scheduling

More information

On the Generation of Circuits and Minimal Forbidden Sets

On the Generation of Circuits and Minimal Forbidden Sets Mathematical Programming manuscript No. (will be inserted by the editor) Frederik Stork Marc Uetz On the Generation of Circuits and Minimal Forbidden Sets January 31, 2004 Abstract We present several complexity

More information

SAMPLE STUDY MATERIAL. GATE, IES & PSUs Civil Engineering

SAMPLE STUDY MATERIAL. GATE, IES & PSUs Civil Engineering SAMPLE STUDY MATERIAL Postal Correspondence Course GATE, IES & PSUs Civil Engineering CPM & CONSTRUCTION EQUIPMENT C O N T E N T 1. CPM AND PERT... 03-16 2. CRASHING OF NETWORK... 17-20 3. ENGINEERING

More information

Efficient Workplan Management in Maintenance Tasks

Efficient Workplan Management in Maintenance Tasks Efficient Workplan Management in Maintenance Tasks Michel Wilson a Nico Roos b Bob Huisman c Cees Witteveen a a Delft University of Technology, Dept of Software Technology b Maastricht University, Dept

More information

Allocation and Scheduling of Conditional Task Graphs

Allocation and Scheduling of Conditional Task Graphs Allocation and Scheduling of Conditional Task Graphs Michele Lombardi, Michela Milano DEIS Universita di Bologna - Viale Risorgimento, 2 40136 Bologna Italy Abstract We propose an original, complete and

More information

Interval based Uncertain Reasoning using Fuzzy and Rough Sets

Interval based Uncertain Reasoning using Fuzzy and Rough Sets Interval based Uncertain Reasoning using Fuzzy and Rough Sets Y.Y. Yao Jian Wang Department of Computer Science Lakehead University Thunder Bay, Ontario Canada P7B 5E1 Abstract This paper examines two

More information

On flexible database querying via extensions to fuzzy sets

On flexible database querying via extensions to fuzzy sets On flexible database querying via extensions to fuzzy sets Guy de Tré, Rita de Caluwe Computer Science Laboratory Ghent University Sint-Pietersnieuwstraat 41, B-9000 Ghent, Belgium {guy.detre,rita.decaluwe}@ugent.be

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

Complexity Theory Part II

Complexity Theory Part II Complexity Theory Part II Time Complexity The time complexity of a TM M is a function denoting the worst-case number of steps M takes on any input of length n. By convention, n denotes the length of the

More information

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018 CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 9 PSPACE: A Class of Problems Beyond NP Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization Department of Computer Science Series of Publications C Report C-2004-2 The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization Taneli Mielikäinen Esko Ukkonen University

More information

Solution of Fuzzy System of Linear Equations with Polynomial Parametric Form

Solution of Fuzzy System of Linear Equations with Polynomial Parametric Form Available at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 7, Issue 2 (December 2012), pp. 648-657 Applications and Applied Mathematics: An International Journal (AAM) Solution of Fuzzy System

More information

The complexity of acyclic subhypergraph problems

The complexity of acyclic subhypergraph problems The complexity of acyclic subhypergraph problems David Duris and Yann Strozecki Équipe de Logique Mathématique (FRE 3233) - Université Paris Diderot-Paris 7 {duris,strozecki}@logique.jussieu.fr Abstract.

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

Project scheduling with calendars

Project scheduling with calendars OR Spektrum (2001) 23: 325 334 c Springer-Verlag 2001 Project scheduling with calendars Birger Franck, Klaus Neumann, and Christoph Schwindt Institut für Wirtschaftstheorie und Operations Research, University

More information

Proactive Algorithms for Job Shop Scheduling with Probabilistic Durations

Proactive Algorithms for Job Shop Scheduling with Probabilistic Durations Journal of Artificial Intelligence Research 28 (2007) 183 232 Submitted 5/06; published 3/07 Proactive Algorithms for Job Shop Scheduling with Probabilistic Durations J. Christopher Beck jcb@mie.utoronto.ca

More information

FINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016)

FINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016) FINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016) The final exam will be on Thursday, May 12, from 8:00 10:00 am, at our regular class location (CSI 2117). It will be closed-book and closed-notes, except

More information

Fuzzy relation equations with dual composition

Fuzzy relation equations with dual composition Fuzzy relation equations with dual composition Lenka Nosková University of Ostrava Institute for Research and Applications of Fuzzy Modeling 30. dubna 22, 701 03 Ostrava 1 Czech Republic Lenka.Noskova@osu.cz

More information

2 GRAPH AND NETWORK OPTIMIZATION. E. Amaldi Introduction to Operations Research Politecnico Milano 1

2 GRAPH AND NETWORK OPTIMIZATION. E. Amaldi Introduction to Operations Research Politecnico Milano 1 2 GRAPH AND NETWORK OPTIMIZATION E. Amaldi Introduction to Operations Research Politecnico Milano 1 A variety of decision-making problems can be formulated in terms of graphs and networks Examples: - transportation

More information

Scheduling Markovian PERT networks to maximize the net present value: new results

Scheduling Markovian PERT networks to maximize the net present value: new results Scheduling Markovian PERT networks to maximize the net present value: new results Hermans B, Leus R. KBI_1709 Scheduling Markovian PERT networks to maximize the net present value: New results Ben Hermans,a

More information

From a Possibility Theory View of Formal Concept Analysis to the Possibilistic Handling of Incomplete and Uncertain Contexts

From a Possibility Theory View of Formal Concept Analysis to the Possibilistic Handling of Incomplete and Uncertain Contexts From a Possibility Theory View of Formal Concept Analysis to the Possibilistic Handling of Incomplete and Uncertain Contexts Zina Ait-Yakoub 1, Yassine Djouadi 2, Didier Dubois 2, and Henri Prade 2 1 Department

More information

Chapter One. The Real Number System

Chapter One. The Real Number System Chapter One. The Real Number System We shall give a quick introduction to the real number system. It is imperative that we know how the set of real numbers behaves in the way that its completeness and

More information

Chapter 4 Deliberation with Temporal Domain Models

Chapter 4 Deliberation with Temporal Domain Models Last update: April 10, 2018 Chapter 4 Deliberation with Temporal Domain Models Section 4.4: Constraint Management Section 4.5: Acting with Temporal Models Automated Planning and Acting Malik Ghallab, Dana

More information

Exact Algorithms for Dominating Induced Matching Based on Graph Partition

Exact Algorithms for Dominating Induced Matching Based on Graph Partition Exact Algorithms for Dominating Induced Matching Based on Graph Partition Mingyu Xiao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731,

More information

EDF Feasibility and Hardware Accelerators

EDF Feasibility and Hardware Accelerators EDF Feasibility and Hardware Accelerators Andrew Morton University of Waterloo, Waterloo, Canada, arrmorton@uwaterloo.ca Wayne M. Loucks University of Waterloo, Waterloo, Canada, wmloucks@pads.uwaterloo.ca

More information

On analysis of the unicity of Jeffrey s rule of conditioning in a possibilistic framework

On analysis of the unicity of Jeffrey s rule of conditioning in a possibilistic framework Abstract Conditioning is an important task for designing intelligent systems in artificial intelligence. This paper addresses an issue related to the possibilistic counterparts of Jeffrey s rule of conditioning.

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

Algorithm Design. Scheduling Algorithms. Part 2. Parallel machines. Open-shop Scheduling. Job-shop Scheduling.

Algorithm Design. Scheduling Algorithms. Part 2. Parallel machines. Open-shop Scheduling. Job-shop Scheduling. Algorithm Design Scheduling Algorithms Part 2 Parallel machines. Open-shop Scheduling. Job-shop Scheduling. 1 Parallel Machines n jobs need to be scheduled on m machines, M 1,M 2,,M m. Each machine can

More information

Characterization of Semantics for Argument Systems

Characterization of Semantics for Argument Systems Characterization of Semantics for Argument Systems Philippe Besnard and Sylvie Doutre IRIT Université Paul Sabatier 118, route de Narbonne 31062 Toulouse Cedex 4 France besnard, doutre}@irit.fr Abstract

More information

1 Review of Vertex Cover

1 Review of Vertex Cover CS266: Parameterized Algorithms and Complexity Stanford University Lecture 3 Tuesday, April 9 Scribe: Huacheng Yu Spring 2013 1 Review of Vertex Cover In the last lecture, we discussed FPT algorithms for

More information

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions Summary of the previous lecture Recall that we mentioned the following topics: P: is the set of decision problems (or languages) that are solvable in polynomial time. NP: is the set of decision problems

More information

The Complexity of Computing the Behaviour of Lattice Automata on Infinite Trees

The Complexity of Computing the Behaviour of Lattice Automata on Infinite Trees The Complexity of Computing the Behaviour of Lattice Automata on Infinite Trees Karsten Lehmann a, Rafael Peñaloza b a Optimisation Research Group, NICTA Artificial Intelligence Group, Australian National

More information

GENERAL AGGREGATION OPERATORS ACTING ON FUZZY NUMBERS INDUCED BY ORDINARY AGGREGATION OPERATORS

GENERAL AGGREGATION OPERATORS ACTING ON FUZZY NUMBERS INDUCED BY ORDINARY AGGREGATION OPERATORS Novi Sad J. Math. Vol. 33, No. 2, 2003, 67 76 67 GENERAL AGGREGATION OPERATORS ACTING ON FUZZY NUMBERS INDUCED BY ORDINARY AGGREGATION OPERATORS Aleksandar Takači 1 Abstract. Some special general aggregation

More information

Bi-Arc Digraphs and Conservative Polymorphisms

Bi-Arc Digraphs and Conservative Polymorphisms Bi-Arc Digraphs and Conservative Polymorphisms Pavol Hell Arash Rafiey arxiv:1608.03368v3 [cs.ds] 29 Dec 2016 Abstract We introduce the class of bi-arc digraphs, and show they coincide with the class of

More information

Tutorial on Mathematical Induction

Tutorial on Mathematical Induction Tutorial on Mathematical Induction Roy Overbeek VU University Amsterdam Department of Computer Science r.overbeek@student.vu.nl April 22, 2014 1 Dominoes: from case-by-case to induction Suppose that you

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.

More information

Lectures 6, 7 and part of 8

Lectures 6, 7 and part of 8 Lectures 6, 7 and part of 8 Uriel Feige April 26, May 3, May 10, 2015 1 Linear programming duality 1.1 The diet problem revisited Recall the diet problem from Lecture 1. There are n foods, m nutrients,

More information

2. Project management

2. Project management 2. Project management In what follows, we consider production processes where only a single item of a specific product is produced in the planning horizon In this case specific instruments for planning

More information

Differential approximation results for the Steiner tree problem

Differential approximation results for the Steiner tree problem Differential approximation results for the Steiner tree problem Marc Demange, Jérôme Monnot, Vangelis Paschos To cite this version: Marc Demange, Jérôme Monnot, Vangelis Paschos. Differential approximation

More information

arxiv: v3 [cs.dm] 18 Oct 2017

arxiv: v3 [cs.dm] 18 Oct 2017 Decycling a Graph by the Removal of a Matching: Characterizations for Special Classes arxiv:1707.02473v3 [cs.dm] 18 Oct 2017 Fábio Protti and Uéverton dos Santos Souza Institute of Computing - Universidade

More information

Outline. Relaxation. Outline DMP204 SCHEDULING, TIMETABLING AND ROUTING. 1. Lagrangian Relaxation. Lecture 12 Single Machine Models, Column Generation

Outline. Relaxation. Outline DMP204 SCHEDULING, TIMETABLING AND ROUTING. 1. Lagrangian Relaxation. Lecture 12 Single Machine Models, Column Generation Outline DMP204 SCHEDULING, TIMETABLING AND ROUTING 1. Lagrangian Relaxation Lecture 12 Single Machine Models, Column Generation 2. Dantzig-Wolfe Decomposition Dantzig-Wolfe Decomposition Delayed Column

More information

Fuzzy Function: Theoretical and Practical Point of View

Fuzzy Function: Theoretical and Practical Point of View EUSFLAT-LFA 2011 July 2011 Aix-les-Bains, France Fuzzy Function: Theoretical and Practical Point of View Irina Perfilieva, University of Ostrava, Inst. for Research and Applications of Fuzzy Modeling,

More information

On the S-Labeling problem

On the S-Labeling problem On the S-Labeling problem Guillaume Fertin Laboratoire d Informatique de Nantes-Atlantique (LINA), UMR CNRS 6241 Université de Nantes, 2 rue de la Houssinière, 4422 Nantes Cedex - France guillaume.fertin@univ-nantes.fr

More information

Detailed Proof of The PerronFrobenius Theorem

Detailed Proof of The PerronFrobenius Theorem Detailed Proof of The PerronFrobenius Theorem Arseny M Shur Ural Federal University October 30, 2016 1 Introduction This famous theorem has numerous applications, but to apply it you should understand

More information

FACTOR GRAPH OF NON-COMMUTATIVE RING

FACTOR GRAPH OF NON-COMMUTATIVE RING International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 6, November - December 2018, pp. 178 183, Article ID: IJARET_09_06_019 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=6

More information

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012 Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:

More information

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University Algorithms NP -Complete Problems Dong Kyue Kim Hanyang University dqkim@hanyang.ac.kr The Class P Definition 13.2 Polynomially bounded An algorithm is said to be polynomially bounded if its worst-case

More information

WHILE it is customary to talk about events and time

WHILE it is customary to talk about events and time IEEE TRANSACTIONS ON FUZZY SYSTEMS 1 Efficient Algorithms for Fuzzy Qualitative Temporal Reasoning Steven Schockaert and Martine De Cock Abstract Fuzzy qualitative temporal relations have been proposed

More information

On the errors introduced by the naive Bayes independence assumption

On the errors introduced by the naive Bayes independence assumption On the errors introduced by the naive Bayes independence assumption Author Matthijs de Wachter 3671100 Utrecht University Master Thesis Artificial Intelligence Supervisor Dr. Silja Renooij Department of

More information

On Machine Dependency in Shop Scheduling

On Machine Dependency in Shop Scheduling On Machine Dependency in Shop Scheduling Evgeny Shchepin Nodari Vakhania Abstract One of the main restrictions in scheduling problems are the machine (resource) restrictions: each machine can perform at

More information

FUZZY CONDITIONAL TEMPORAL PROBLEMS: STRONG AND WEAK CONSISTENCY. Marco Falda,,,2 Francesca Rossi,,1 K. Brent Venable,,1

FUZZY CONDITIONAL TEMPORAL PROBLEMS: STRONG AND WEAK CONSISTENCY. Marco Falda,,,2 Francesca Rossi,,1 K. Brent Venable,,1 FUZZY CONDITIONAL TEMPORAL PROBLEMS: STRONG AND WEAK CONSISTENCY Marco Falda,,,2 Francesca Rossi,,1 K. Brent Venable,,1 Dept. of Pure and Applied Mathematics University of Padova, via Trieste 63, 35121

More information

The Computational Complexity of Dominance and Consistency in CP-Nets

The Computational Complexity of Dominance and Consistency in CP-Nets Journal of Artificial Intelligence Research 33 (2008) 403-432 Submitted 07/08; published 11/08 The Computational Complexity of Dominance and Consistency in CP-Nets Judy Goldsmith Department of Computer

More information

Fuzzy Systems. Introduction

Fuzzy Systems. Introduction Fuzzy Systems Introduction Prof. Dr. Rudolf Kruse Christoph Doell {kruse,doell}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge Processing

More information

On maxitive integration

On maxitive integration On maxitive integration Marco E. G. V. Cattaneo Department of Mathematics, University of Hull m.cattaneo@hull.ac.uk Abstract A functional is said to be maxitive if it commutes with the (pointwise supremum

More information

Multi-criteria approximation schemes for the resource constrained shortest path problem

Multi-criteria approximation schemes for the resource constrained shortest path problem Noname manuscript No. (will be inserted by the editor) Multi-criteria approximation schemes for the resource constrained shortest path problem Markó Horváth Tamás Kis Received: date / Accepted: date Abstract

More information

Qualitative Constraint Satisfaction Problems: Algorithms, Computational Complexity, and Extended Framework

Qualitative Constraint Satisfaction Problems: Algorithms, Computational Complexity, and Extended Framework Qualitative Constraint Satisfaction Problems: Algorithms, Computational Complexity, and Extended Framework Weiming Liu Faculty of Engineering and Information Technology University of Technology, Sydney

More information

Intrinsic products and factorizations of matrices

Intrinsic products and factorizations of matrices Available online at www.sciencedirect.com Linear Algebra and its Applications 428 (2008) 5 3 www.elsevier.com/locate/laa Intrinsic products and factorizations of matrices Miroslav Fiedler Academy of Sciences

More information

On the Complexity of Partitioning Graphs for Arc-Flags

On the Complexity of Partitioning Graphs for Arc-Flags Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 17, no. 3, pp. 65 99 (013) DOI: 10.7155/jgaa.0094 On the Complexity of Partitioning Graphs for Arc-Flags Reinhard Bauer Moritz Baum Ignaz

More information

Nonlinear Optimization Subject to a System of Fuzzy Relational Equations with Max-min Composition

Nonlinear Optimization Subject to a System of Fuzzy Relational Equations with Max-min Composition The 7th International Symposium on Operations Research and Its Applications (ISORA 08) Lijiang, China, October 31 Novemver 3, 2008 Copyright 2008 ORSC & APORC, pp. 1 9 Nonlinear Optimization Subject to

More information

A NOTE ON THE PRECEDENCE-CONSTRAINED CLASS SEQUENCING PROBLEM

A NOTE ON THE PRECEDENCE-CONSTRAINED CLASS SEQUENCING PROBLEM A NOTE ON THE PRECEDENCE-CONSTRAINED CLASS SEQUENCING PROBLEM JOSÉ R. CORREA, SAMUEL FIORINI, AND NICOLÁS E. STIER-MOSES School of Business, Universidad Adolfo Ibáñez, Santiago, Chile; correa@uai.cl Department

More information

Recoverable Robustness in Scheduling Problems

Recoverable Robustness in Scheduling Problems Master Thesis Computing Science Recoverable Robustness in Scheduling Problems Author: J.M.J. Stoef (3470997) J.M.J.Stoef@uu.nl Supervisors: dr. J.A. Hoogeveen J.A.Hoogeveen@uu.nl dr. ir. J.M. van den Akker

More information

Computing Possibly Optimal Solutions for Multi-Objective Constraint Optimisation with Tradeoffs

Computing Possibly Optimal Solutions for Multi-Objective Constraint Optimisation with Tradeoffs Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 215) Computing Possibly Optimal Solutions for Multi-Objective Constraint Optimisation with Tradeoffs Nic

More information

Maximal ideal recursive semantics for defeasible argumentation

Maximal ideal recursive semantics for defeasible argumentation Maximal ideal recursive semantics for defeasible argumentation Teresa Alsinet 1, Ramón Béjar 1, Lluis Godo 2, and Francesc Guitart 1 1 Department of Computer Science University of Lleida Jaume II, 69 251

More information

Automata on linear orderings

Automata on linear orderings Automata on linear orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 September 25, 2006 Abstract We consider words indexed by linear

More information